US20110252140A1 - Method for establishing a link between the applications of an authentication card of a subscriber and an ims network - Google Patents

Method for establishing a link between the applications of an authentication card of a subscriber and an ims network Download PDF

Info

Publication number
US20110252140A1
US20110252140A1 US13/126,904 US200913126904A US2011252140A1 US 20110252140 A1 US20110252140 A1 US 20110252140A1 US 200913126904 A US200913126904 A US 200913126904A US 2011252140 A1 US2011252140 A1 US 2011252140A1
Authority
US
United States
Prior art keywords
card
terminal
ims
server
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/126,904
Other versions
US8788670B2 (en
Inventor
Jacques Seif
Hervé Ganem
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SAS
Original Assignee
Gemalto SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto SA filed Critical Gemalto SA
Assigned to GEMALTO SA reassignment GEMALTO SA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GANEM, HERVE, SEIF, JACQUES
Publication of US20110252140A1 publication Critical patent/US20110252140A1/en
Application granted granted Critical
Publication of US8788670B2 publication Critical patent/US8788670B2/en
Assigned to THALES DIS FRANCE SA reassignment THALES DIS FRANCE SA CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: GEMALTO SA
Assigned to THALES DIS FRANCE SAS reassignment THALES DIS FRANCE SAS ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: THALES DIS FRANCE SA
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0471Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]

Definitions

  • the field of the invention is that of mobile telecommunications systems and more particularly relates to an improvement brought in a standardized architecture known as IMS (IP Multimedia Subsystem).
  • IMS IP Multimedia Subsystem
  • IMS architecture makes it possible to supply the users of telecommunications networks of the GSM, GPRS or UMTS types with fixed and mobile multimedia services.
  • This system uses the VoIP (Voice over IP) technology based on a standardized 3GPP implementation of SIP (Session Initiation Protocol) operating in a standard IP (Internet Protocol) protocol.
  • VoIP Voice over IP
  • SIP Session Initiation Protocol
  • IP Internet Protocol
  • IMS architecture supplies an intermediate layer in the core of networks for switching from the conventional mode (circuit mode) to the session mode. In other words, it makes it possible to open several sessions during the same communication.
  • IMS makes it possible to mix multimedia components, for example adding a chat session to video or sending a photograph during a phone call. Starting a video session during a call is also possible, using IMS.
  • An IMS connection is conventionally established by the user's mobile terminal. Requesting a data channel from the IMS network establishes a secured IP connection and it is then possible to send and to receive any type of data via this channel.
  • the 3GPP TS 33.203 standard discloses the characteristics and the security mechanisms aiming at securing the accesses to an IMS server and more particularly how the SIP signalling is protected between the user-subscriber and the IMS server, how this subscriber is authentified and how the subscriber authentifies the IMS server.
  • An IMS-implementing mobile terminal thus establishes a secured channel with the IMS server and protects the communications of data with the server.
  • the IMS server and the subscriber make a mutual authentication and tap keys. Tapped keys are used for establishing a secured channel between the subscriber and the IMS server.
  • the secured channel can be established using an IP-SEC (acronym for IP—secured Internet channel) as described in 3GPP TS 33.203.
  • IMS can be operated with any type of networks (fixed, mobile or wireless), including the packets switching functions, such as the GPRS, UMTS, CDMA 2000, WLAN, WiMAX, DSL, and the cable. Older circuit switching systems (POTS, GSM) are supported by gateways. Interfaces opened between the control and service layers make it possible to mix calls/sessions of various access networks.
  • networks fixed, mobile or wireless
  • packets switching functions such as the GPRS, UMTS, CDMA 2000, WLAN, WiMAX, DSL, and the cable.
  • POTS, GSM Global System for Mobile Communications
  • GSM Global System for Mobile communications
  • Interfaces opened between the control and service layers make it possible to mix calls/sessions of various access networks.
  • the IMS channel is totally managed by the user's (generally mobile) terminal, typically composed of a portable telephone or a Smartphone (portable telephone coupled with a PDA).
  • the terminal initiates and manages communication on the IMS channel.
  • the terminal switched to the IMS mode has a particularity in that it encrypts the data it sends and decrypts the data it receives from the IMS server.
  • the thus generated physical channel is called an IP-SEC channel.
  • a mobile terminal conventionally includes a card (SIM in a 2G network or UICC with a USIM aboard, in a 3G network) making it possible to authentify the user in the network.
  • SIM in a 2G network or UICC with a USIM aboard, in a 3G network
  • the card only plays a part in the authentication and the generation of keys giving access to the IMS networks. But the card, in the present state of the art, has no role to play when the terminal is switched to the IMS mode.
  • the drawback of this solution is that, if applications, for example an on-line game application or a bank application (for example enabling to pay with his/her mobile terminal), exist in the card, these cannot use the IMS channel since the access to the IMS network requires an authentication and the information transmitted between the IMS terminal and the card are encrypted. Since appropriate security mechanisms cannot be implemented, the card applications cannot be considered as IMS applications. For example, a user will not be allowed to make a payment from his/her mobile terminal while conversing (through a conventional voice channel) with the shopkeeper, if the payment application is totally implemented in the card.
  • the object of the present invention is to provide solutions making it possible to store and to execute IMS applications in the SIM card.
  • one object of the present invention is to allow a user to operate the applications existing in the card from his/her mobile terminal, with the data resulting from such (in-coming or out-going) applications transiting between the card and the server via an IP-SEC channel, and thus in IMS mode, without increasing the number of available IP-SEC channels in the network.
  • the sharing of resources is provided by a proxy server aboard the terminal.
  • the proxy can use the SIP language used by the IMS applications.
  • the sharing of resources is provided by a system of the IP battery type serializing the IP packets transmitted and received by the terminal and the card.
  • An application implementing a service for discovering the security parameters used for the connection between the mobile and the IMS network is used in the terminal.
  • FIG. 1 represents a first embodiment of the method according to the invention
  • FIG. 2 represents a second embodiment of the method according to the invention.
  • FIG. 1 represents a first embodiment of the method according to the invention.
  • a proxy server is used as an interface between the terminal and the card.
  • a proxy is a data server, the function of which consists in relaying requests between two stations (for example, a client station and a server).
  • a terminal 10 typically a mobile telephone terminal has a subscriber's authentication card 11 , typically an UICC card (acronym for Universal Integrated Circuit Card).
  • the card 11 guarantees the integrity and the security of all the types of personal data. Knowingly, it more particularly includes SIM applications in a GSM network and/or USIM applications in a UMTS network.
  • the card 11 also conventionally includes a processor, ROM, RAM and EEPROM memories, as well as an I/O interface circuit with the terminal 10 . It further includes an ISIM Module (IP Multimedia Services Identity Module).
  • ISIM Module IP Multimedia Services Identity Module
  • the user of the terminal 10 is in radio communication (voice channel not shown) with another user. Knowingly and as previously disclosed, the terminal 10 is able to request the opening of an IMS channel 12 from an IMS server 13 .
  • the channel 12 corresponds to the previously mentioned secured IP-SEC channel.
  • the terminal 10 contains one application providing the encryption of data, which it sends to the server 13 and the decryption of data received by this server 13 .
  • a proxy server 14 is provided at the level of the terminal 10 .
  • the function of the proxy server 14 is limited to interfacing (repeater function) between the terminal 10 and the card 11 for the IMS application.
  • the card 11 can become aware that the proxy server 14 exists by various means, the simplest one being for the terminal 10 to send one piece of information (for example an APDU or through another signalling mechanism) to the card 11 , mentioning the existence of the server 14 . If one application in the card, for example a bank application intended to check a signature, needs to use the channel 12 , it can also request the terminal 10 to open a communication via the proxy 14 .
  • one application in the card for example a bank application intended to check a signature, needs to use the channel 12 , it can also request the terminal 10 to open a communication via the proxy 14 .
  • the card can become aware of the existence of the proxy by storing information in a file, through one APDU transmitted from the terminal to the card, through a command encapsulated in an IP packet, through an implicit discovery (try-and-error) i.e. the card tries to contact the proxy: if it answers, the service starts, if it does not, the application stops.
  • Such commands or solicitations can be directly executed with the proxy or by contacting other contacts in the card conventionally used or new ones (for example a discovery table or a request for a discovery on IP).
  • Data sent by the terminal 10 to the proxy 14 (and intended for the card 11 ) is not encrypted by the terminal.
  • the contents of the messages which transit as a plain text between the terminal 10 and the card 11 can contain encrypted data.
  • the card receives data it processes the data (in the IMS application it contains) and the answer data is then re-encrypted when it is sent back to the terminal 10 via the proxy 14 in non-encrypted SIP messages, except for some application data encrypted by the card. This may, for example, be the encryption of a signature in a bank application.
  • the terminal 10 encrypts the whole SIP message to send it to the server 13 .
  • the card 11 can thus supply and access secured IMS services without requiring the opening of another IP-SEC channel.
  • One alternative solution consists in implementing, on the mobile, a service for discovering the parameters of the security association established between the mobile and the IMS network.
  • Such parameters include among other things the list of the encryption algorithms used as well as the numbers of ports to be used for transmitting data.
  • Such parameters are typically stored in the mobile in a table which can be accessed by the IMS applications through a programming interface enabling these to use the IP-SEC channel.
  • the discovery service shown here can use the same means as those available to the IMS applications.
  • FIG. 2 shows a second embodiment of the method according to the invention.
  • the proxy 14 in FIG. 1 is replaced by a system of IP battery 20 which serializes the IP packets transmitted and received by the terminal 10 and the card 11 .
  • a discovery service can be implemented there too, so that the card 11 can be aware that the system of IP battery 20 exists.
  • the packets received from the terminal 10 and from the card 11 are transmitted as soon as possible to the IMS server 13 on an IP-SEC secured connection 21 .
  • the same mechanism operates for transmitting the descending IP packets, from the IMS server 13 to the terminal 10 and the card 11 .
  • the battery 20 management may be left either to the terminal 10 , or to the card 11 , with the operation being substantially of the FIFO type.
  • the battery 20 can physically be accommodated in the terminal 10 or in the card 11 .
  • Data received and to be transmitted are decrypted and encrypted locally, i.e. either in the terminal 10 , or in the card 11 .
  • the channel 21 conveys enciphered packets only.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a method for establishing a secured link between an authentication card of a subscriber and a telecommunication network, the card being connected to a mobile terminal, wherein the method includes the steps of establishing a secure link between the terminal and an IMS network; and sharing the resources of the secure link between the terminal and the card.

Description

  • The field of the invention is that of mobile telecommunications systems and more particularly relates to an improvement brought in a standardized architecture known as IMS (IP Multimedia Subsystem).
  • IMS architecture makes it possible to supply the users of telecommunications networks of the GSM, GPRS or UMTS types with fixed and mobile multimedia services. This system uses the VoIP (Voice over IP) technology based on a standardized 3GPP implementation of SIP (Session Initiation Protocol) operating in a standard IP (Internet Protocol) protocol.
  • IMS architecture supplies an intermediate layer in the core of networks for switching from the conventional mode (circuit mode) to the session mode. In other words, it makes it possible to open several sessions during the same communication. As an illustration, IMS makes it possible to mix multimedia components, for example adding a chat session to video or sending a photograph during a phone call. Starting a video session during a call is also possible, using IMS.
  • An IMS connection is conventionally established by the user's mobile terminal. Requesting a data channel from the IMS network establishes a secured IP connection and it is then possible to send and to receive any type of data via this channel.
  • The 3GPP TS 33.203 standard discloses the characteristics and the security mechanisms aiming at securing the accesses to an IMS server and more particularly how the SIP signalling is protected between the user-subscriber and the IMS server, how this subscriber is authentified and how the subscriber authentifies the IMS server.
  • An IMS-implementing mobile terminal thus establishes a secured channel with the IMS server and protects the communications of data with the server.
  • In practice, the IMS server and the subscriber make a mutual authentication and tap keys. Tapped keys are used for establishing a secured channel between the subscriber and the IMS server. The secured channel can be established using an IP-SEC (acronym for IP—secured Internet channel) as described in 3GPP TS 33.203.
  • IMS can be operated with any type of networks (fixed, mobile or wireless), including the packets switching functions, such as the GPRS, UMTS, CDMA 2000, WLAN, WiMAX, DSL, and the cable. Older circuit switching systems (POTS, GSM) are supported by gateways. Interfaces opened between the control and service layers make it possible to mix calls/sessions of various access networks.
  • In the current systems, the IMS channel is totally managed by the user's (generally mobile) terminal, typically composed of a portable telephone or a Smartphone (portable telephone coupled with a PDA). The terminal initiates and manages communication on the IMS channel. The terminal switched to the IMS mode has a particularity in that it encrypts the data it sends and decrypts the data it receives from the IMS server. The thus generated physical channel is called an IP-SEC channel.
  • In addition, a mobile terminal conventionally includes a card (SIM in a 2G network or UICC with a USIM aboard, in a 3G network) making it possible to authentify the user in the network. The card only plays a part in the authentication and the generation of keys giving access to the IMS networks. But the card, in the present state of the art, has no role to play when the terminal is switched to the IMS mode.
  • The drawback of this solution is that, if applications, for example an on-line game application or a bank application (for example enabling to pay with his/her mobile terminal), exist in the card, these cannot use the IMS channel since the access to the IMS network requires an authentication and the information transmitted between the IMS terminal and the card are encrypted. Since appropriate security mechanisms cannot be implemented, the card applications cannot be considered as IMS applications. For example, a user will not be allowed to make a payment from his/her mobile terminal while conversing (through a conventional voice channel) with the shopkeeper, if the payment application is totally implemented in the card.
  • One solution to remedy this problem could consist in authorizing the card to establish a new security association, between the card and the IMS network, independent of the one managed by the terminal.
  • The drawback of this solution however is that the resources, as regards the infrastructure, are limited to the operator which, in order to enable the users of its telecommunications network to simultaneously operate a first conventional IP-SEC channel through the functions of their mobile terminals and a second IP-SEC channel for application functions (computer programs) accommodated in the cards of such mobile terminals, would theoretically be obliged to adapt its network infrastructure and to increase its capacity. This cannot be considered, from an economical point of view.
  • The object of the present invention is to provide solutions making it possible to store and to execute IMS applications in the SIM card.
  • More precisely, one object of the present invention is to allow a user to operate the applications existing in the card from his/her mobile terminal, with the data resulting from such (in-coming or out-going) applications transiting between the card and the server via an IP-SEC channel, and thus in IMS mode, without increasing the number of available IP-SEC channels in the network.
  • This object, as well as other ones which will appear subsequently, is reached thanks to a method for sharing the resources of the IP-SEC connection established by the terminal. Such resources (i.e. the IP packets emitted toward the IMS server and those received from the server) are shared by the terminal and the card.
  • In one preferred embodiment, the sharing of resources is provided by a proxy server aboard the terminal. The proxy can use the SIP language used by the IMS applications.
  • In another preferred embodiment, the sharing of resources is provided by a system of the IP battery type serializing the IP packets transmitted and received by the terminal and the card. An application implementing a service for discovering the security parameters used for the connection between the mobile and the IMS network is used in the terminal.
  • Other characteristics and advantages of the invention will appear when reading the following description of two advantageous embodiments of the invention, given as an illustration and not as a limitation, and the appended drawings, wherein:
  • FIG. 1 represents a first embodiment of the method according to the invention;
  • FIG. 2 represents a second embodiment of the method according to the invention.
  • FIG. 1 represents a first embodiment of the method according to the invention. In this embodiment, a proxy server is used as an interface between the terminal and the card.
  • Knowingly, a proxy is a data server, the function of which consists in relaying requests between two stations (for example, a client station and a server).
  • In FIG. 1, a terminal 10, typically a mobile telephone terminal has a subscriber's authentication card 11, typically an UICC card (acronym for Universal Integrated Circuit Card). The card 11 guarantees the integrity and the security of all the types of personal data. Knowingly, it more particularly includes SIM applications in a GSM network and/or USIM applications in a UMTS network.
  • The card 11 also conventionally includes a processor, ROM, RAM and EEPROM memories, as well as an I/O interface circuit with the terminal 10. It further includes an ISIM Module (IP Multimedia Services Identity Module).
  • In operation, the user of the terminal 10 is in radio communication (voice channel not shown) with another user. Knowingly and as previously disclosed, the terminal 10 is able to request the opening of an IMS channel 12 from an IMS server 13. The channel 12 corresponds to the previously mentioned secured IP-SEC channel. For this purpose, the terminal 10 contains one application providing the encryption of data, which it sends to the server 13 and the decryption of data received by this server 13.
  • According to the invention and in order to enable the applications existing in the card 11 to take advantage of the existence of the secured channel 12, a proxy server 14 is provided at the level of the terminal 10. The function of the proxy server 14 is limited to interfacing (repeater function) between the terminal 10 and the card 11 for the IMS application.
  • The card 11 can become aware that the proxy server 14 exists by various means, the simplest one being for the terminal 10 to send one piece of information (for example an APDU or through another signalling mechanism) to the card 11, mentioning the existence of the server 14. If one application in the card, for example a bank application intended to check a signature, needs to use the channel 12, it can also request the terminal 10 to open a communication via the proxy 14.
  • The card can become aware of the existence of the proxy by storing information in a file, through one APDU transmitted from the terminal to the card, through a command encapsulated in an IP packet, through an implicit discovery (try-and-error) i.e. the card tries to contact the proxy: if it answers, the service starts, if it does not, the application stops. Such commands or solicitations can be directly executed with the proxy or by contacting other contacts in the card conventionally used or new ones (for example a discovery table or a request for a discovery on IP).
  • Data sent by the terminal 10 to the proxy 14 (and intended for the card 11) is not encrypted by the terminal. In order to ensure the protection of end-to-end exchanges (between, for example, the banking application in the card and the remote bank server), the contents of the messages which transit as a plain text between the terminal 10 and the card 11 can contain encrypted data. When the card receives data, it processes the data (in the IMS application it contains) and the answer data is then re-encrypted when it is sent back to the terminal 10 via the proxy 14 in non-encrypted SIP messages, except for some application data encrypted by the card. This may, for example, be the encryption of a signature in a bank application. The terminal 10 encrypts the whole SIP message to send it to the server 13.
  • The card 11 can thus supply and access secured IMS services without requiring the opening of another IP-SEC channel.
  • One alternative solution consists in implementing, on the mobile, a service for discovering the parameters of the security association established between the mobile and the IMS network. Such parameters include among other things the list of the encryption algorithms used as well as the numbers of ports to be used for transmitting data. Such parameters are typically stored in the mobile in a table which can be accessed by the IMS applications through a programming interface enabling these to use the IP-SEC channel. The discovery service shown here can use the same means as those available to the IMS applications.
  • FIG. 2 shows a second embodiment of the method according to the invention.
  • In this second embodiment, the proxy 14 in FIG. 1 is replaced by a system of IP battery 20 which serializes the IP packets transmitted and received by the terminal 10 and the card 11. A discovery service can be implemented there too, so that the card 11 can be aware that the system of IP battery 20 exists.
  • The packets received from the terminal 10 and from the card 11 are transmitted as soon as possible to the IMS server 13 on an IP-SEC secured connection 21. The same mechanism operates for transmitting the descending IP packets, from the IMS server 13 to the terminal 10 and the card 11.
  • The battery 20 management may be left either to the terminal 10, or to the card 11, with the operation being substantially of the FIFO type. The battery 20 can physically be accommodated in the terminal 10 or in the card 11.
  • Data received and to be transmitted are decrypted and encrypted locally, i.e. either in the terminal 10, or in the card 11.
  • Like channel 12 in FIG. 1, the channel 21 conveys enciphered packets only.
  • The above description was given as an illustration only and not as a limitation and the person skilled in the art will easily imagine other embodiments of the present invention within the scope of the claims.

Claims (3)

1. A method for establishing a secured connection between an authentication card of a subscriber to a telecommunication network and such network, with said card being connected to a mobile terminal, said method comprising:
establishing a secured connection between said terminal and a network of the IMS type; and
sharing the resources of said secured connection between said terminal and said card.
2. A method according to claim 1, wherein said resource sharing is provided by a proxy server aboard said terminal.
3. A method according to claim 1, wherein said resource sharing is provided by a system of the IP battery type serializing IP packets transmitted and received by said terminal and said card.
US13/126,904 2008-10-31 2009-10-22 Method for establishing a link between the applications of an authentication card of a subscriber and an IMS network Active 2030-07-07 US8788670B2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP08305766.1 2008-10-31
EP08305766A EP2182696A1 (en) 2008-10-31 2008-10-31 Method of establishing a link between the applications of a subscriber authentication card and an IMS network
EP08305766 2008-10-31
PCT/EP2009/063935 WO2010049350A1 (en) 2008-10-31 2009-10-22 Method for establishing a link between the applications of an authentication card of a subscriber and an ims network

Publications (2)

Publication Number Publication Date
US20110252140A1 true US20110252140A1 (en) 2011-10-13
US8788670B2 US8788670B2 (en) 2014-07-22

Family

ID=40364280

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/126,904 Active 2030-07-07 US8788670B2 (en) 2008-10-31 2009-10-22 Method for establishing a link between the applications of an authentication card of a subscriber and an IMS network

Country Status (3)

Country Link
US (1) US8788670B2 (en)
EP (2) EP2182696A1 (en)
WO (1) WO2010049350A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120047237A1 (en) * 2009-04-16 2012-02-23 Petter Arvidsson Method, Server, Computer Program and Computer Program Product for Communicating with Secure Element
US20140010148A1 (en) * 2010-12-23 2014-01-09 Research In Motion Limited Card Toolkit Support for IP Multimedia Subsystem
US10275613B1 (en) * 2018-04-20 2019-04-30 Capital One Services, Llc Identity breach notification and remediation
WO2023005524A1 (en) * 2021-07-27 2023-02-02 中兴通讯股份有限公司 Order payment method and apparatus, and storage medium, device and system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302572B (en) * 2015-05-15 2020-09-22 Tcl科技集团股份有限公司 Multi-channel communication method and system between servers
US11750773B2 (en) 2021-08-25 2023-09-05 Bank Of America Corporation Real-time, two-way video authentication system

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930493A (en) * 1995-06-07 1999-07-27 International Business Machines Corporation Multimedia server system and method for communicating multimedia information
US20020162021A1 (en) * 2001-04-30 2002-10-31 Audebert Yves Louis Gabriel Method and system for establishing a remote connection to a personal security device
US20050149740A1 (en) * 2003-12-31 2005-07-07 Kotzin Michael D. Method and apparatus for device authentication
US20050164738A1 (en) * 2004-01-26 2005-07-28 Sbc Knowledge Ventures, L.P. Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal
US6963740B1 (en) * 2001-07-31 2005-11-08 Mobile-Mind, Inc. Secure enterprise communication system utilizing enterprise-specific security/trust token-enabled wireless communication devices
US7076273B2 (en) * 2002-11-05 2006-07-11 Siemens Aktiengesellschaft Method for controlling a multimedia messaging service between a telecommunication device and a telecommunication network, respective smart card and telecommunication device
US20060229090A1 (en) * 2005-03-07 2006-10-12 Ladue Christoph K Symbol stream virtual radio organism method & apparatus
US20070160085A1 (en) * 2006-01-11 2007-07-12 Infineon Technologies Ag Method and system for transmitting supplementary data, and communication terminal
US7281244B2 (en) * 2003-01-16 2007-10-09 Sun Microsystems, Inc. Using a digital fingerprint to commit loaded data in a device
US7421732B2 (en) * 2003-05-05 2008-09-02 Nokia Corporation System, apparatus, and method for providing generic internet protocol authentication
US7484095B2 (en) * 2003-01-16 2009-01-27 Sun Microsystems, Inc. System for communicating program data between a first device and a second device
US20090086740A1 (en) * 2007-10-01 2009-04-02 General Instrument Corporation Customer Premises Gateway providing User Devices with Access to Internet Protocol Multimedia Subsystem (IMS) Services and Non-IMS Services
US7870153B2 (en) * 2006-01-24 2011-01-11 Citrix Systems, Inc. Methods and systems for executing, by a virtual machine, an application program requested by a client machine
US8046824B2 (en) * 2005-04-11 2011-10-25 Nokia Corporation Generic key-decision mechanism for GAA
US8166530B2 (en) * 2003-04-07 2012-04-24 Research In Motion Limited Method and system for supporting portable authenticators on electronic devices

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69925732T2 (en) * 1999-10-22 2006-03-16 Telefonaktiebolaget Lm Ericsson (Publ) Mobile phone with built-in security firmware
EP1608123A1 (en) * 2004-06-15 2005-12-21 Axalto SA Method and device for communicating HTTP messages with portable devices
US20080092224A1 (en) * 2006-10-16 2008-04-17 Motorola, Inc. Method and apparatus for seamless connections and service continuity in an agnostic access internet protocol multimedia communication system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930493A (en) * 1995-06-07 1999-07-27 International Business Machines Corporation Multimedia server system and method for communicating multimedia information
US20020162021A1 (en) * 2001-04-30 2002-10-31 Audebert Yves Louis Gabriel Method and system for establishing a remote connection to a personal security device
US7853789B2 (en) * 2001-04-30 2010-12-14 Activcard Ireland, Limited Method and system for establishing a communications pipe between a personal security device and a remote computer system
US6963740B1 (en) * 2001-07-31 2005-11-08 Mobile-Mind, Inc. Secure enterprise communication system utilizing enterprise-specific security/trust token-enabled wireless communication devices
US7076273B2 (en) * 2002-11-05 2006-07-11 Siemens Aktiengesellschaft Method for controlling a multimedia messaging service between a telecommunication device and a telecommunication network, respective smart card and telecommunication device
US7281244B2 (en) * 2003-01-16 2007-10-09 Sun Microsystems, Inc. Using a digital fingerprint to commit loaded data in a device
US7484095B2 (en) * 2003-01-16 2009-01-27 Sun Microsystems, Inc. System for communicating program data between a first device and a second device
US8166530B2 (en) * 2003-04-07 2012-04-24 Research In Motion Limited Method and system for supporting portable authenticators on electronic devices
US7421732B2 (en) * 2003-05-05 2008-09-02 Nokia Corporation System, apparatus, and method for providing generic internet protocol authentication
US20050149740A1 (en) * 2003-12-31 2005-07-07 Kotzin Michael D. Method and apparatus for device authentication
US20050164738A1 (en) * 2004-01-26 2005-07-28 Sbc Knowledge Ventures, L.P. Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal
US20060229090A1 (en) * 2005-03-07 2006-10-12 Ladue Christoph K Symbol stream virtual radio organism method & apparatus
US8046824B2 (en) * 2005-04-11 2011-10-25 Nokia Corporation Generic key-decision mechanism for GAA
US20070160085A1 (en) * 2006-01-11 2007-07-12 Infineon Technologies Ag Method and system for transmitting supplementary data, and communication terminal
US7870153B2 (en) * 2006-01-24 2011-01-11 Citrix Systems, Inc. Methods and systems for executing, by a virtual machine, an application program requested by a client machine
US20090086740A1 (en) * 2007-10-01 2009-04-02 General Instrument Corporation Customer Premises Gateway providing User Devices with Access to Internet Protocol Multimedia Subsystem (IMS) Services and Non-IMS Services

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120047237A1 (en) * 2009-04-16 2012-02-23 Petter Arvidsson Method, Server, Computer Program and Computer Program Product for Communicating with Secure Element
US9572025B2 (en) * 2009-04-16 2017-02-14 Telefonaktiebolaget Lm Ericsson (Publ) Method, server, computer program and computer program product for communicating with secure element
US20140010148A1 (en) * 2010-12-23 2014-01-09 Research In Motion Limited Card Toolkit Support for IP Multimedia Subsystem
US9619442B2 (en) 2010-12-23 2017-04-11 Blackberry Limited Card toolkit support for IP multimedia subsystem
US9717063B2 (en) * 2010-12-23 2017-07-25 Blackberry Limited Card toolkit support for IP multimedia subsystem
US10275613B1 (en) * 2018-04-20 2019-04-30 Capital One Services, Llc Identity breach notification and remediation
US11093637B2 (en) 2018-04-20 2021-08-17 Capital One Services, Llc Identity breach notification and remediation
US11822694B2 (en) 2018-04-20 2023-11-21 Capital One Services, Llc Identity breach notification and remediation
WO2023005524A1 (en) * 2021-07-27 2023-02-02 中兴通讯股份有限公司 Order payment method and apparatus, and storage medium, device and system

Also Published As

Publication number Publication date
WO2010049350A1 (en) 2010-05-06
EP2182696A1 (en) 2010-05-05
EP2347555A1 (en) 2011-07-27
US8788670B2 (en) 2014-07-22

Similar Documents

Publication Publication Date Title
US10206102B2 (en) Network access control methods and apparatus
US7992212B2 (en) Mobile terminal and gateway for remotely controlling data transfer from secure network
KR101438243B1 (en) Sim based authentication
KR101363981B1 (en) Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses
TWI351888B (en) Method of providing wireless telecommunication ser
US9154955B1 (en) Authenticated delivery of premium communication services to trusted devices over an untrusted network
US20050259673A1 (en) Method and system for end-to-end communication between a universal integrated circuit card and a remote entity over an IP-based wireless wide area network and the internet
US8788670B2 (en) Method for establishing a link between the applications of an authentication card of a subscriber and an IMS network
KR20200022512A (en) Network security management method and device
US8116782B2 (en) Communication quality control system
JP2008518533A (en) Method and system for transparently authenticating mobile users and accessing web services
US10681143B2 (en) Establishment of a secure connection for a communication session
US20090070586A1 (en) Method, Device and Computer Program Product for the Encoded Transmission of Media Data Between the Media Server and the Subscriber Terminal
US9154949B1 (en) Authenticated delivery of premium communication services to untrusted devices over an untrusted network
AU2010329814B2 (en) Smart card security feature profile in home subscriber server
Garcia-Martin Input 3rd-generation partnership project (3GPP) release 5 requirements on the session initiation protocol (SIP)
CN113873510B (en) Secure communication method, related device and system
CN114040385A (en) VoLTE-based encrypted call system and method
EP4072093A1 (en) Communication method and apparatus
CN113382410B (en) Communication method and related device and computer readable storage medium
CN105992205A (en) Method for sharing WLAN ciphers and device for sharing WLAN ciphers
JP5331032B2 (en) Network call control system
KR20070086008A (en) System, terminal, method, and software for communicating messages
US20070124808A1 (en) System and method for providing bi-directional communication service
CN117083893A (en) First node, second node, third node for handling encrypted traffic in a communication network and method performed by the same

Legal Events

Date Code Title Description
AS Assignment

Owner name: GEMALTO SA, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SEIF, JACQUES;GANEM, HERVE;SIGNING DATES FROM 20110420 TO 20110513;REEL/FRAME:026437/0392

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: THALES DIS FRANCE SA, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:GEMALTO SA;REEL/FRAME:064716/0408

Effective date: 20170716

AS Assignment

Owner name: THALES DIS FRANCE SAS, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THALES DIS FRANCE SA;REEL/FRAME:064771/0016

Effective date: 20211215